WO2023283902A1 - 一种报文传输方法及装置 - Google Patents

一种报文传输方法及装置 Download PDF

Info

Publication number
WO2023283902A1
WO2023283902A1 PCT/CN2021/106623 CN2021106623W WO2023283902A1 WO 2023283902 A1 WO2023283902 A1 WO 2023283902A1 CN 2021106623 W CN2021106623 W CN 2021106623W WO 2023283902 A1 WO2023283902 A1 WO 2023283902A1
Authority
WO
WIPO (PCT)
Prior art keywords
network device
message
mapping rule
target
scheduling
Prior art date
Application number
PCT/CN2021/106623
Other languages
English (en)
French (fr)
Inventor
程作品
Original Assignee
新华三技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 新华三技术有限公司 filed Critical 新华三技术有限公司
Priority to KR1020237040041A priority Critical patent/KR20230169378A/ko
Priority to PCT/CN2021/106623 priority patent/WO2023283902A1/zh
Priority to JP2023571943A priority patent/JP2024521725A/ja
Priority to EP21949688.2A priority patent/EP4319055A4/en
Priority to CN202180001884.0A priority patent/CN113711572A/zh
Publication of WO2023283902A1 publication Critical patent/WO2023283902A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/28Flow control; Congestion control in relation to timing considerations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/32Flow control; Congestion control by discarding or delaying data units, e.g. packets or frames
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/34Flow control; Congestion control ensuring sequence integrity, e.g. using sequence numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/50Queue scheduling
    • H04L47/62Queue scheduling characterised by scheduling criteria
    • H04L47/621Individual queue per connection or flow, e.g. per VC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0823Errors, e.g. transmission errors
    • H04L43/0829Packet loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays
    • H04L43/0864Round trip delays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays
    • H04L43/087Jitter
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • H04L43/106Active monitoring, e.g. heartbeat, ping or trace-route using time related information in packets, e.g. by adding timestamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/31Flow control; Congestion control by tagging of packets, e.g. using discard eligibility [DE] bits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network

Definitions

  • the present application relates to the field of network technology, in particular to a message transmission method and device.
  • the purpose of the embodiments of the present application is to provide a message transmission method and device, so as to improve the adaptability of deterministic transmission to WAN.
  • the specific technical scheme is as follows:
  • the embodiment of the present application provides a message transmission method, which is applied to the first network device, and the method includes:
  • the received message After buffering the received message for a preset period of time, the received message is forwarded.
  • the method also includes:
  • the step of recombining the received message includes:
  • the first mapping rule includes a scheduling queue; the scheduling queue is used to cache packets of the same flow.
  • the first mapping rule includes a scheduling period, and the scheduling period is used to indicate a time period for packet forwarding
  • the step of forwarding the received message includes:
  • the received message is buffered for a preset time period, and then the received message is forwarded.
  • the time difference between the scheduling cycle of the first network device and the scheduling cycle of the second network device is greater than or equal to a target delay, and the target delay is the difference between the first network device and the second network device. Latency between second network devices.
  • the first mapping rule includes the preset duration.
  • the packet header of the packet carries the first mapping rule.
  • the message header of the message carries a quintuple, and the quintuple is used to determine the flow to which the message belongs; or,
  • the packet header of the message carries a target flow identifier, and the flow identifier is used to determine the flow to which the target packet belongs.
  • the scheduling frequencies of the first network device and the second network device are the same, and the scheduling frequency is a frequency for dividing a scheduling period.
  • the method also includes:
  • the quality of service includes delay and jitter
  • the tail of the telemetry message carries the time stamp of each network device passing through.
  • the embodiment of the present application provides a message transmission method, which is applied to a controller, and the method includes:
  • the first mapping rule is used to instruct the first network device to forward the received message after caching the received message sent by the second network device for a preset period of time.
  • the method also includes:
  • the first mapping rule and the second mapping rule include a scheduling period, and the scheduling period is used to indicate a time period for packet forwarding;
  • the time difference between the scheduling cycle of the first network device and the scheduling cycle of the second network device is greater than or equal to the target delay, and the target delay is the first network device and the second network device time delay between.
  • the method also includes:
  • the quality of service includes delay and jitter; the tail of the telemetry message carries the time stamp of each network device passing through.
  • the method before sending the first mapping rule to the first network device, the method further includes:
  • the request message carries target transmission parameters
  • the step of determining the first mapping rule according to the request message includes:
  • the quality of service of each path between the first network device and the second network device it is determined that the quality of service satisfies the first mapping rule of the target transmission parameter.
  • an embodiment of the present application provides a message transmission device, which is applied to a first network device, and the device includes:
  • a first receiving unit configured to receive a message sent by a second network device
  • the forwarding unit is configured to forward the received message after buffering the received message for a preset period of time.
  • the embodiment of the present application provides a message transmission device, which is applied to a controller, and the device includes:
  • the first sending unit is configured to send a first mapping rule to the first network device; the first mapping rule is used to instruct the first network device to cache the received message sent by the second network device for a preset period of time, Forward received messages.
  • an embodiment of the present application provides a network device, including a processor and a machine-readable storage medium, where the machine-readable storage medium stores machine-executable instructions that can be executed by the processor, and the processing The device is prompted by the machine-executable instructions to: implement any of the steps of the message transmission method provided in the first aspect above.
  • an embodiment of the present application provides a controller, including a processor and a machine-readable storage medium, where the machine-readable storage medium stores machine-executable instructions that can be executed by the processor, and the processing The machine is prompted by the machine-executable instructions to: realize the steps of any message transmission method provided in the second aspect above.
  • the embodiment of the present application provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, the above-mentioned first aspect or the second aspect provides Any of the message transmission method steps.
  • the embodiment of the present application further provides a computer program, which, when running on a computer, causes the computer to execute any of the steps of the message transmission method provided in the first aspect or the second aspect.
  • the first network device caches the received packets for a preset duration. Within the preset time period for which the first network device caches the received packet, the first network device may receive other packets belonging to the same flow as the packet. In this way, when the first network device forwards the received message after buffering the received message for a preset period of time, the jitter caused by forwarding the message of the same flow can be reduced, and deterministic transmission can be realized. It can be seen that in the technical solution provided by the embodiment of the present application, deterministic transmission can be realized by buffering the message on the network device at the receiving side. This deterministic transmission method does not require other network devices on the transmission path . This enables the technical solutions provided by the embodiments of the present application to better adapt to complex WANs, and improves the adaptability of deterministic transmission to WANs.
  • FIG. 1 is a schematic diagram of a WAN provided by an embodiment of the present application.
  • FIG. 2 is a schematic flowchart of the first message transmission method provided by the embodiment of the present application.
  • Fig. 3 is a second schematic flow chart of the message transmission method provided by the embodiment of the present application.
  • FIG. 4 is a schematic diagram of a received message provided by an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of a third message transmission method provided by an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of a fourth message transmission method provided by an embodiment of the present application.
  • FIG. 7 is a schematic flowchart of a fifth message transmission method provided by the embodiment of the present application.
  • FIG. 8 is a schematic flowchart of a sixth method of message transmission provided by an embodiment of the present application.
  • FIG. 9 is another schematic diagram of the WAN provided by the embodiment of the present application.
  • FIG. 10 is a schematic flowchart of a seventh message transmission method provided by an embodiment of the present application.
  • FIG. 11 is a schematic flowchart of an eighth method of message transmission provided by an embodiment of the present application.
  • FIG. 12 is a schematic diagram of the forwarding of the INT message provided by the embodiment of the present application.
  • FIG. 13 is a schematic flowchart of a ninth method of message transmission provided by an embodiment of the present application.
  • FIG. 14 is a schematic flowchart of a tenth message transmission method provided by the embodiment of the present application.
  • FIG. 15 is a first structural schematic diagram of a message transmission device provided in an embodiment of the present application.
  • FIG. 16 is a schematic diagram of a second structure of a message transmission device provided in an embodiment of the present application.
  • FIG. 17 is a schematic structural diagram of a network device provided in an embodiment of the present application.
  • FIG. 18 is a schematic structural diagram of a controller provided by an embodiment of the present application.
  • Time Sensitive Network A set of Ethernet standards, through core technologies such as precise time synchronization and timing scheduling, to achieve time-synchronized low-latency streaming services, and provide low-latency isochronous services for each unit in the system Standard data, thereby providing the basis for the convergence of control, measurement, configuration, user interface (User Interface, UI) and file exchange infrastructure.
  • TSN Time Sensitive Network
  • Time slot Time is divided into time slots in equal parts, which is the smallest scheduling unit in TSN.
  • Deterministic network refers to the network that guarantees the deterministic bandwidth, delay, jitter and packet loss rate indicators of the business; deterministic network technology is a new type of quality of service (Quality of Service, QoS) guarantee technology.
  • QoS Quality of Service
  • the demand for a deterministic network mainly comes from two aspects:
  • Ethernet In traditional scenarios such as industrial automation and intelligent manufacturing, it is necessary to use Ethernet to uniformly replace dozens of fieldbus and real-time Ethernet standards, and integrate information technology (Information Technology, IT) networks and operational technology (Operational Technology) , OT) network, to realize the co-network transmission of best-effort flow and industrial delay-sensitive flow, and reduce costs.
  • IT Information Technology
  • OT Opera Technology
  • deterministic transmission With the surge in communication traffic between machines, it is necessary to combine 5th Generation Mobile Communication Technology (5G) in emerging network application scenarios such as autonomous driving, remote surgery, and holographic communication. and other technologies to build a super high-speed rail in the network and realize end-to-end transmission of deterministic services, referred to as deterministic transmission.
  • 5G 5th Generation Mobile Communication Technology
  • Capacity expansion/light load capacity expansion is to expand the bandwidth, so that the network is in a state of light load. Now Ethernet has been able to achieve a single port bandwidth of 400Gbps.
  • Traffic shaping Limit the speed of specific ports or traffic through technologies such as token bucket and credit shaping. For example, the bandwidth of the outbound port of the upstream node is 8Gbps, and the free bandwidth of the downstream node is only 2Gbps. This requires limiting the transmission bandwidth of the upstream node to less than 2Gbps to avoid congestion of the downstream node.
  • Queue scheduling refers to scheduling traffic at the egress port of the switch. First, mark the packets with different priorities, then add the packets to the corresponding priority queues, and finally use different queue scheduling algorithms to process the packets. For example, Strict Priority (Strict Priority, SP) algorithm and Weighted Round Robin (WRR) algorithm.
  • Strict Priority Strict Priority, SP
  • WRR Weighted Round Robin
  • the SP algorithm schedules strictly according to the high and low order of the queue priority. Only after all the packets in the high-priority queue are scheduled, the low-priority queue can be scheduled.
  • the WRR algorithm assigns a weight to each queue, and forwards them sequentially according to the weight ratio, so as to prevent low-priority traffic from waiting for a long time.
  • Congestion control When there is too much traffic and the buffer space of the buffer queue is insufficient, there will be congestion and packet loss in the network, which requires congestion control.
  • explicit congestion notification (Explicit Congestion Notification, ECN) or Data Center Transmission Control Protocol (Data Center Transmission Control Protocol, DCTCP) based on explicit congestion marks or Timely, Swift, etc. based on round-trip delay (Round-Trip Time) can be used.
  • RTT congestion control method to detect congestion, so that the upstream node until the sending end reduces the rate of sending messages.
  • TDM time division multiplexing
  • Clock synchronization That is, the clocks of the entire network are synchronized.
  • the clocks of the terminal and the switch are the same, and the network card must also stamp hard time stamps on the packets.
  • one is the master-slave mode, select the most accurate clock as the master clock, and other slave clocks are synchronized with the master clock; the other is the voting mode, for example, there are 9 devices in a domain, The current clock of 5 devices is 1:00, and the clock of 4 devices is 1:01. According to the principle of minority obeying the majority, all 9 devices are adjusted to 1:00.
  • Time slot planning A time slot generally refers to a transmission resource in the time dimension of an egress port of a switch.
  • the bandwidth of the outgoing port of a certain switch is 1Gbps, and a message has 1500 bytes (Byte), that is, 12000 bits (bit), the transmission of the message will occupy a certain period of 12 microseconds ( ⁇ s) of the outgoing port. Gap resources. Which time slot resource is occupied is determined by the transmission start time of the message.
  • the network span is small: the above-mentioned TSN-based deterministic transmission is only suitable for layer-2 network forwarding, and the deterministic network is equivalent to a small-scale local area network.
  • All network devices along the way must support TSN. If one of the network devices does not support TSN, it will not be able to achieve the effect of end-to-end deterministic transmission.
  • the controller assigns a Segmented Identification (SID) to each network device, and specifies the egress port and forwarding period corresponding to the SID.
  • SID Segmented Identification
  • the network device parses the message header to obtain the SID carried in the message, and then determines the specific outbound port and forwarding period, and forwards the message through the determined outbound port according to the determined forwarding period.
  • the above message transmission method based on the CSQF mechanism can solve the problem that the network span is small, but it still has the following disadvantages: all network devices along the way must support the CSQF mechanism.
  • the actual network is very complex.
  • the source terminal and the destination terminal span the WAN, and there are many network devices between the source terminal and the destination terminal. It is difficult for these network devices to support the CSQF mechanism. This makes deterministic transmission less adaptable to WAN in related technologies.
  • the embodiment of the present application provides a message transmission method, which can be applied to the WAN shown in Figure 1, the WAN includes a controller and network devices R1-R9, as shown in Figure 1 In 1, only 9 network devices are used as an example for illustration, which does not serve as a limitation.
  • the network device may be a router or a switch.
  • the controller may be a software defined network (Software Defined Network, SDN) controller, or a collector, etc., which is not limited.
  • SDN Software Defined Network
  • the controller is used to manage the network devices of the entire WAN, perform path planning for deterministic transmission, and perform bandwidth reservation for deterministic transmission.
  • terminal A is connected to network device R1
  • terminal B is connected to network device R9
  • the terminal A and terminal B need to cross the WAN.
  • terminal A needs to perform end-to-end deterministic transmission with terminal B
  • terminal A is the source terminal
  • terminal B is the destination terminal
  • the network device R1 connected to terminal A and the network device R9 connected to terminal B can be understood as gateway devices
  • the network device R1 and the network device R9 are the key nodes of the end-to-end deterministic transmission, and the frequency of scheduling and forwarding of the two is the same.
  • an embodiment of the present application provides a packet transmission method. As shown in FIG. 2 , the method is applied to a first network device. Wherein, the first network device may be any network device in the WAN.
  • the above-mentioned method message transmission method comprises the following steps:
  • Step S21 receiving a message sent by the second network device.
  • Step S22 after caching the received message for a preset period of time, forwarding the received message.
  • the first network device caches the received packets for a preset duration. Within the preset time period for which the first network device caches the received packet, the first network device may receive other packets belonging to the same flow as the packet. In this way, when the first network device forwards the received message after buffering the received message for a preset period of time, the jitter of forwarding the message of the same flow can be reduced, and deterministic transmission can be realized. It can be seen that in the technical solution provided by the embodiment of the present application, deterministic transmission can be realized by buffering the message on the network device at the receiving side. This deterministic transmission method does not require other network devices on the transmission path . This enables the technical solutions provided by the embodiments of the present application to better adapt to complex WANs, and improves the adaptability of deterministic transmission to WANs.
  • the second network device may be any network device in the WAN.
  • the second network device sends packets to other network devices.
  • the message may be sent by the terminal to the second network device, or may be generated by the second network device itself.
  • the first network device caches the received message, and forwards the received message after buffering for a preset period of time.
  • the preset duration can be set according to actual needs.
  • the preset duration may be 10 microseconds ( ⁇ s), 20 ⁇ s, or 30 ⁇ s, etc.
  • the embodiment of the present application in order to reduce the jitter of packet forwarding in the same flow, the embodiment of the present application further provides a packet transmission method, as shown in FIG. 3 , the method may further include step S220.
  • Step S220 performing reassembly processing on the received packets; after reassembly processing, the packets belonging to the same flow are arranged in order.
  • the flow may be a data flow or a control flow.
  • a packet header may carry a quintuple, and the quintuple is used to determine the stream to which the packet belongs.
  • the header of the packet may carry a flow identifier, and the flow identifier is used to determine the flow to which the packet belongs.
  • the first network device receives the packets, and performs reassembly processing on the received packets; after reassembly processing, the packets belonging to the same flow are arranged in order, that is, out-of-order recovery is realized.
  • FIG. 4 a schematic diagram of a received message is shown in FIG. 4 .
  • rectangular boxes represent packets, and packets with the same number are packets of the same flow.
  • the first network device does not receive them sequentially.
  • the first network device first receives a packet of flow 1, and then receives a packet of flow 2 and After a packet of stream 3, a packet of stream 1 is received.
  • the first network is configured to reassemble the received packets so that the packets of the same flow are arranged sequentially, as shown on the right side of FIG. 4 .
  • the first network device receives the packets, and reassembles the received packets; after the reassembly processing, the packets belonging to the same flow are arranged sequentially, which can further reduce the jitter of forwarding the packets of the same flow.
  • the first network device may pre-store the first mapping rule, and reassemble the received message according to the first mapping rule.
  • the first network device determines the first mapping rule corresponding to the flow to which the received message belongs, and then reassembles the received message according to the first mapping rule.
  • the first mapping rule may include a scheduling queue; the scheduling queue is used to cache packets of the same flow.
  • the first network device can cache packets of the same flow in the same scheduling queue, thereby realizing out-of-order recovery
  • the first mapping rule may include a scheduling period, and the scheduling period is used to indicate a time period for packet forwarding.
  • step S22 may be: after the scheduling period of the received message is reached, the received message is cached for a preset time period, and then the received message is forwarded.
  • the preset duration is 1 scheduling period
  • the scheduling period of the message is the Xth scheduling period
  • the message is forwarded in the X to X+1 scheduling periods.
  • the packet forwarding is periodically controlled, which facilitates the synchronization of packets and reduces the jitter of packet transmission.
  • the time difference between the scheduling cycle of the first network device and the scheduling cycle of the second network device can be greater than or equal to the target delay, and the target delay is the time delay between the first network device and the second network device delay. This can ensure that the first network device can process the message relatively quickly after receiving the message from the second network device, and reduce the time delay between the first network device and the second network device.
  • the first mapping rule in order to control received packets and reduce jitter, may include a preset duration.
  • the header of the packet sent by the second network device to the first network device may carry the first mapping rule.
  • the scheduling frequencies of the first network device and the second network device are the same, and the scheduling frequency is a frequency for dividing a scheduling period. In this way, end-to-end jitter can be further ensured.
  • a message transmission method is also provided, as shown in Figure 5, the method may include the following steps:
  • Step S51 receiving a telemetry message sent by the second network device; the telemetry message is used to detect the service quality of each path between the second network device and the first network device.
  • the quality of service may include but not limited to delay and jitter.
  • the telemetry message may be an in-band network telemetry (In-band Network Telemetry, INT) message.
  • INT In-band Network Telemetry
  • the tail of the telemetry message carries the time stamp of each network device passing through.
  • Step S52 sending a telemetry message to the controller.
  • the controller determines the maximum delay of each path, specific encapsulation and processing operations, etc., to ensure that the deterministic transmission service is valid within the scope of QoS constraints.
  • the embodiment of the present application also provides a message transmission method, as shown in Figure 6, the method is applied to the controller, including the following steps:
  • Step S61 sending a first mapping rule to the first network device; the first mapping rule is used to instruct the first network device to forward the received message after buffering the received message sent by the second network device for a preset period of time.
  • the controller can monitor the WAN.
  • the controller may determine a new mapping rule, that is, the first mapping rule rule, sending the first mapping rule to the first network device.
  • the controller may determine the first mapping rule in the following manner, as shown in FIG. 7:
  • Step S71 receiving a request message sent by the second network device, where the request message is used to request a mapping rule for transmitting messages between the second network device and the first network device.
  • Step S72 Determine the first mapping rule according to the request message.
  • the controller when the controller receives the request message sent by the second network device, it determines the first mapping rule, and then executes step S61 to send the first mapping rule to the first network device, so that the second network device to Deterministic transmission between first network devices.
  • the controller can issue mapping rules according to implementation requirements, which saves network resources.
  • the above request message carries target transmission parameters; according to the quality of service of each path between the first network device and the second network device, determine the path whose quality of service meets the target transmission parameters and the first mapping rule . Afterwards, the second network device forwards the message to the first network device along the determined path, and the first network device forwards the message according to the first mapping rule, so that deterministic transmission of user requirements can be realized.
  • the target transmission parameter may be bandwidth required for message transmission, time delay of message transmission, and the like.
  • the embodiment of the present application also provides a message transmission method, as shown in FIG. 8, which may include the following steps:
  • Step S81 receiving a telemetry message sent by the first network device, the telemetry message is used to detect the service quality of each path between the second network device and the first network device;
  • Step S82 Determine the service quality of each path according to the information carried in the telemetry message.
  • the controller can determine the maximum delay of each path, specific encapsulation and processing operations, etc., to ensure that the deterministic transmission service is valid within the scope of QoS constraints.
  • the controller may also send the second mapping rule to the second network device.
  • the first mapping rule and the second mapping rule include a scheduling period, and the scheduling period is used to indicate a time period for message forwarding;
  • the time difference between the scheduling cycle of the first network device and the scheduling cycle of the second network device is greater than or equal to the target delay, and the target delay is the delay between the first network device and the second network device.
  • the message transmission method provided by the embodiment of the present application will be described below in conjunction with the WAN shown in FIG. 1 .
  • the end-to-end deterministic transmission between terminal A and terminal B may include:
  • the terminal A sends a message 1 to the network device R1, and the message 1 carries a flow identifier (Flow Identity, FlowID) 9.
  • Flow Identity Flow Identity
  • network device R1 After receiving packet 1, network device R1 determines the path 1 corresponding to flow identifier 1 according to the pre-stored correspondence between flow identifiers, paths, and mapping rules (as indicated by network device R1 ⁇ R3 ⁇ R7 ⁇ R9 in Figure 1 path) and mapping rule 1.
  • SA represents the source address
  • DA represents the destination address
  • the dotted line with the arrow indicates the transmission path of the packet.
  • F9, Q7, and T3 in the message represent mapping rules.
  • mapping rule is a forwarding rule indicating the packet. Mapping rules can be set according to actual needs.
  • the mapping rule may include, but is not limited to, information such as a scheduling queue corresponding to a flow identifier, a scheduling period, and a buffer time.
  • mapping rules include FX1, QX2, and TX3.
  • FX1 is FlowID
  • QX2 is the scheduling queue identifier, which means the X2 queue, and the message carrying FlowID X1 is about to be mapped to the X2 queue
  • TX3 is the scheduling cycle, which means the X3 scheduling cycle, that is, the message carrying FlowID X1 is scheduled at X3 Periodic forwarding.
  • the mapping rule may also include a cache time (that is, the above-mentioned preset duration), so as to realize message synchronization and reduce message transmission jitter. For example, the cache time is 1 scheduling period. At this time, the above mapping rule indicates that the message carrying FlowID X1 is mapped to the X2 queue, and the message cached in the X2 queue is forwarded from the X3 to X3+1 scheduling period.
  • mapping rule 1 includes F9, Q7 and T3, the cache time is one scheduling period, and path 1 is the path indicated by network device R1 ⁇ R3 ⁇ R7 ⁇ R9 in FIG. 1 .
  • Network device R1 forwards message 1 to network device R9 along path 1 according to mapping rule 1, that is, message 1 carrying FlowID 9 is mapped to the 7th queue, and forwards the 7th queue to network device R9 in the 3rd-4th scheduling cycle Packet 1 cached in .
  • the network device R1 can encapsulate the above-mentioned mapping rule 1 in the message header of the message 1, as shown in Figure 1, so that the network device R9 can accurately forward the message 1 according to the mapping rule 1, and realize deterministic transmission .
  • the header of the packet shown in FIG. 1 may further include information such as the SID of each network device on the path.
  • network device R1 may not encapsulate the above mapping rule 1 in the message header of message 1, as shown in Figure 9 WAN, SA represents the source address, DA represents the destination address, with The dotted line of the arrow indicates the transmission path of the packet.
  • the R9 carried in the packet header represents the SID of the network device R9
  • the R7 carried in the packet header represents the SID of the network device R7
  • the R3 carried in the packet header represents the SID of the network device R3.
  • SID The network device R9 determines the corresponding mapping rule 1 according to the correspondence between the locally stored flow identifier and the mapping rule.
  • FIG. 9 only uses packet forwarding based on the SRv6 technology as an example for illustration. If other technologies are used for packet forwarding, the SID may not be carried in the packet header.
  • the network device R9 After receiving the message 1, the network device R9 buffers the message 1 for a preset time according to the mapping rule 1, and then sends the message 1 to the terminal B, thereby realizing deterministic transmission.
  • the seventh schematic flow chart of the message transmission method provided by the embodiment of the present application is applied to the second network device connected to the source terminal, and includes the following steps:
  • step S101 a target packet sent by a source terminal is obtained, and the target packet carries a target flow identifier.
  • the source terminal sends a message, that is, a target message, to the second network device.
  • the flow identifier carried in the target packet is the target flow identifier.
  • Step S102 according to the pre-stored correspondence between the flow identifier, the path and the mapping rule, determine the target path and the target mapping rule corresponding to the target flow identifier.
  • the second network device pre-stores the correspondence between the flow identifier, the path, and the mapping rule. After obtaining the target packet, the second network device searches for the corresponding relationship including the target flow identifier in the pre-stored correspondence between the flow identifier, the path, and the mapping rule; after finding the corresponding relationship, the second network device will search for The path included in the found corresponding relationship is used as the target path corresponding to the target flow identifier, and the mapping rule included in the found corresponding relationship is used as the target mapping rule.
  • Step S103 forward the target message along the target path to the first network device with the same frequency as the scheduled forwarding of the second network device, so that the first network device sends the target message to the first network device according to the target mapping rule
  • the destination terminal of the connection sends the destination message.
  • the first network device and the second network device schedule and forward packets at the same frequency.
  • both the first network device and the second network device support the CSQF mechanism, and the first network device and the second network device use the same
  • the scheduling frequency is divided into many scheduling cycles (Cycle). This ensures end-to-end network jitter and determines latency through bandwidth reservation and INT measurements.
  • the second network device After acquiring the target path and the target mapping rule, the second network device forwards the target packet to the first network device along the target path according to the target mapping rule.
  • the WAN may determine the path based on segment routing (Segment Routing, SR).
  • segment Routing Internet Protocol Version 6
  • the controller can use Segment Routing Internet Protocol Version 6 (SRv6) technology based on the sixth version of the Internet Protocol (Segment Routing Internet Protocol Version 6, SRv6) technology for each network device to segment the identifier (Segment Identifier, SID), and based on the SID of each network device, Complete end-to-end visibility, path planning, and bandwidth reservation.
  • SID Segment Routing Internet Protocol Version 6
  • SID Segment Identifier
  • one or more network devices may be included on the target path. After receiving the target message, the one or more network devices do not need to determine the target message. The specific forwarding cycle of the message can be directly forwarded to the target message. After receiving the target message, the first network device may send the target message to the target terminal based on the CSQF mechanism and according to the target mapping rule.
  • the second network device connected to the source terminal and the first network device connected to the destination terminal that is, the frequency of scheduling and forwarding of the two must be the same, for example, only the first network device
  • the device and the second network device support the CSQF mechanism, and there is no requirement for other network devices between the first network device and the second network device, which can achieve definite delay and jitter, and deterministic transmission. This enables the technical solutions provided by the embodiments of the present application to better adapt to complex WANs, and improves the adaptability of deterministic transmission to WANs.
  • the embodiment of the present application also provides a message transmission method, as shown in FIG. 11 , in this method, the following steps may be included before step S101:
  • Step S1010 sending a transmission request message from the source terminal to the controller, where the transmission request message carries target transmission parameters, so that the controller can use the pre-stored quality of service of each path between the first network device and the second network device , determine the target path and target mapping rules that satisfy the target transfer parameters.
  • the source terminal when the source terminal needs to deterministically transmit a message to the destination terminal, the source terminal sends a transmission request message to the second network device, and then the second network device sends a transmission request message to the controller, and the transmission request
  • the message carries target transmission parameters, which may include but not limited to: FlowID, bandwidth required for message transmission, and message transmission delay.
  • the quality of service of each path between the first network device and the second network device is pre-stored in the controller.
  • the quality of service of a path includes the remaining bandwidth of the path, the delay of the path, and the queue resource of the path.
  • the controller After receiving the transmission request message, the controller obtains the target transmission parameters from the transmission request message; according to the pre-stored service quality of each path between the first network device and the second network device, it is determined that the service quality meets the target transmission Arguments to the target path, and determine the target mapping rules.
  • Step S1011 receiving the target path and the target mapping rule issued by the controller, and storing the corresponding relationship between the target flow identifier, the target path and the target mapping rule.
  • the controller issues the target path and the target mapping rule to the second network device.
  • the second network device receives the target path and the target mapping rule delivered by the controller, and then stores the corresponding relationship between the target flow identifier, the target path, and the target mapping rule.
  • the second network device forwards the packet carrying the target flow ID based on the stored correspondence between the target flow ID, the target path, and the target mapping rule.
  • the controller collects the quality of service of multiple paths between the first network device and the second network device, and performs unified planning on the paths, thereby realizing deterministic transmission.
  • the controller after determining the target path and the target mapping rule, issues the corresponding target mapping rule to the first network device.
  • the first network device stores the corresponding relationship between the target flow identifier and the target mapping rule, so as to realize accurate and deterministic transmission.
  • the target mapping rule stored by the first network device is different from the target mapping rule stored by the second network device by a target delay.
  • the target delay is the delay between the first network device and the second network device.
  • the second network device may periodically send telemetry packets to the first network device along each path between the first network device and the second network device.
  • the telemetry message is used to detect the service quality of each path between the first network device and the second network device.
  • the first network device sends the received telemetry message to the controller.
  • the controller After receiving the telemetry message sent by the first network device, the controller obtains the quality of service of each path between the first network device and the second network device from the telemetry message, and then stores the quality of service of each path between the first network device and the second network device. Quality of service for each path between network devices.
  • the telemetry message may be an in-band network telemetry (In-band Network Telemetry, INT) message.
  • INT In-band Network Telemetry
  • the passing network device inserts the device information of the network device in the INT message, and the time stamp of the network device receiving the INT message and sending the INT message Timestamp of the text.
  • the time stamp of the network device receiving the INT message and the time stamp of sending the INT message are collectively referred to as a time stamp, the time stamp is located at the end of the INT message, and the device information of the network device can be located in the message header of the INT message .
  • FIG. 12 shows a schematic diagram of forwarding INT packets.
  • SA represents the source address
  • DA represents the destination address
  • the dotted line with arrows indicates the transmission path of the INT message.
  • network devices R1, R3, R7, and R9 support INT, and add timestamps to INT messages, and network devices R2 and R8 also pass through network devices, but network devices R2 and R8 do not support INT, so no Add a timestamp to the INT packet.
  • the controller After the controller receives the INT message sent by the network device R9, it analyzes the timestamp carried in the INT message to determine the delay and jitter of the network device R1 ⁇ R3 ⁇ R7 ⁇ R9 path, and then completes the end-to-end End QoS detection. This is convenient for the controller to determine the maximum delay of each path, specific encapsulation and processing operations, etc., to ensure that the deterministic transmission service is valid within the QoS constraint range.
  • the network device in order to detect the end-to-end QoS more accurately, when forwarding the INT message along the path from the second network device to the first network device, the network device on the way forwards the network device to the next hop device while , can send INT message to the controller.
  • the controller can give an alarm in time to indicate that the network device is faulty, and then repair the network device in time.
  • the embodiment of the present application also provides a message transmission method, as shown in FIG. 13 , which is applied to the first network device connected to the destination terminal, including the following steps:
  • Step S131 receiving the target message sent by the second network device with the same scheduling and forwarding frequency as the first network device, the target message carries the target flow identifier, and the target message is: the second network device corresponds to the target according to the target flow identifier In the mapping rule, the message sent from the source terminal connected to the second network is sent along the target path.
  • Step S132 sending the target message to the target terminal according to the target mapping rule.
  • the above step S132 may specifically be: sending the target message to the target terminal according to the target mapping rule carried in the target message.
  • the above step S132 may specifically be: according to the pre-stored correspondence between the flow ID and the mapping rule, determine the target mapping rule corresponding to the target flow ID ; According to the determined target mapping rule, send the target message to the target terminal.
  • the first network device receives the target mapping rule issued by the controller, and the target mapping rule is: after the controller receives the transmission request message sent by the source terminal According to the pre-stored quality of service of each path between the second network device and the first network device, the determined mapping rule that satisfies the target transmission parameters carried in the transmission request message; stores the correspondence between the target flow identifier and the target mapping rule relation.
  • the controller may also deliver the target flow identifier to the first network device while delivering the target mapping rule to the first network device.
  • the first network device receives a telemetry message from the second network device, and the telemetry message is used to detect the service quality of each path between the second network device and the first network device; The message is sent to the controller.
  • the telemetry packet may be an INT packet, or other types of telemetry packets.
  • the second network device connected to the source terminal and the first network device connected to the destination terminal that is, the frequency of scheduling and forwarding of the two must be the same, for example, only the first The network device and the second network device support the CSQF mechanism, and there is no requirement for other network devices between the first network device and the second network device, which can achieve definite delay and jitter and deterministic transmission.
  • This enables the technical solutions provided by the embodiments of the present application to better adapt to complex WANs, and improves the adaptability of deterministic transmission to WANs.
  • the embodiment of the present application also provides a message transmission method, as shown in FIG. 14 , in this method, step S132 can be subdivided into steps S1321 and S14322.
  • Step S1321 Reorder the target packets according to the target flow identifier, so that the target packets are adjacent to other packets corresponding to the target flow identifier.
  • Step S1322 according to the object mapping rule, send the reordered object message to the destination terminal.
  • the first network device uses the flow identifier to reorder the messages, that is, to reorganize the messages to achieve out-of-order recovery, to ensure that the messages belonging to the same data stream are sent in order, and to reduce jitter , and then achieve end-to-end deterministic transmission.
  • an embodiment of the present application further provides a message transmission device, as shown in FIG. 15 , which is applied to the first network device, and the method includes:
  • the first receiving unit 151 is configured to receive a message sent by the second network device
  • the forwarding unit 152 is configured to forward the received message after buffering the received message for a preset period of time.
  • the device also includes:
  • the reassembly unit is used to reassemble the received messages; after the reassembly processing, the messages belonging to the same flow are arranged in sequence.
  • the recombination unit is specifically used for:
  • the first mapping rule includes a scheduling queue; the scheduling queue is used to cache packets of the same flow.
  • the first mapping rule includes a scheduling period, and the scheduling period is used to indicate a time period for packet forwarding
  • the forwarding unit is specifically used for:
  • the received message is buffered for a preset time period, and then the received message is forwarded.
  • the time difference between the scheduling cycle of the first network device and the scheduling cycle of the second network device is greater than or equal to a target delay, and the target delay is the difference between the first network device and the second network device. Latency between second network devices.
  • the first mapping rule includes the preset duration.
  • the packet header of the packet carries the first mapping rule.
  • the message header of the message carries a quintuple, and the quintuple is used to determine the flow to which the message belongs; or,
  • the packet header of the message carries a target flow identifier, and the flow identifier is used to determine the flow to which the target packet belongs.
  • the scheduling frequencies of the first network device and the second network device are the same, and the scheduling frequency is a frequency for dividing a scheduling period.
  • the device also includes:
  • the second receiving unit is configured to receive a telemetry message sent by the second network device; the telemetry message is used to detect the service quality of each path between the second network device and the first network device;
  • the quality of service includes delay and jitter
  • the tail of the telemetry message carries the time stamp of each network device passing through.
  • the first network device caches the received packets for a preset duration. Within the preset time period for which the first network device caches the received packet, the first network device may receive other packets belonging to the same flow as the packet. In this way, when the first network device forwards the received message after buffering the received message for a preset period of time, the jitter caused by forwarding the message of the same flow can be reduced, and deterministic transmission can be realized. It can be seen that in the technical solution provided by the embodiment of the present application, deterministic transmission can be realized by buffering the message on the network device at the receiving side. This deterministic transmission method does not require other network devices on the transmission path . This enables the technical solutions provided by the embodiments of the present application to better adapt to complex WANs, and improves the adaptability of deterministic transmission to WANs.
  • the embodiment of the present application also provides a message transmission device, as shown in FIG. 16, which is applied to a controller, and the device includes:
  • the first sending unit 161 is configured to send a first mapping rule to the first network device; the first mapping rule is used to instruct the first network device to cache the received message sent by the second network device for a preset period of time , to forward the received message.
  • the device also includes:
  • a second sending unit configured to send the second mapping rule to the second network device
  • the first mapping rule and the second mapping rule include a scheduling period, and the scheduling period is used to indicate a time period for packet forwarding;
  • the time difference between the scheduling cycle of the first network device and the scheduling cycle of the second network device is greater than or equal to the target delay, and the target delay is the first network device and the second network device time delay between.
  • the device also includes:
  • a first receiving unit configured to receive a telemetry message sent by the first network device, where the telemetry message is used to detect the service quality of each path between the second network device and the first network device;
  • the first determining unit is configured to determine the service quality of each path according to the information carried in the telemetry message.
  • the quality of service includes delay and jitter; the tail of the telemetry message carries the time stamp of each network device passing through.
  • the device also includes:
  • the second receiving unit is configured to receive a request message sent by the second network device before sending the first mapping rule to the first network device, and the request message is used to request the second network device to send the first mapping rule to the first network device. Mapping rules for transmitting packets between network devices;
  • the second determining unit is configured to determine the first mapping rule according to the request packet.
  • the request message carries target transmission parameters
  • the second determining unit is specifically used for:
  • the quality of service of each path between the first network device and the second network device it is determined that the quality of service satisfies the first mapping rule of the target transmission parameter.
  • the first network device caches the received packets for a preset duration. Within the preset time period for which the first network device caches the received packet, the first network device may receive other packets belonging to the same flow as the packet. In this way, when the first network device forwards the received message after buffering the received message for a preset period of time, the jitter caused by forwarding the message of the same flow can be reduced, and deterministic transmission can be realized. It can be seen that in the technical solution provided by the embodiment of the present application, deterministic transmission can be realized by buffering the message on the network device at the receiving side. This deterministic transmission method does not require other network devices on the transmission path . This enables the technical solutions provided by the embodiments of the present application to better adapt to complex WANs, and improves the adaptability of deterministic transmission to WANs.
  • the embodiment of the present application also provides a network device, as shown in FIG. 17 , including a processor 171 and a machine-readable storage medium 172.
  • the machine-readable storage medium 172 stores The machine-executable instructions executed by 171, the processor 171 is prompted by the machine-executable instructions to: implement any one of the above-mentioned steps of the packet transmission method applied to the first network device.
  • the embodiment of the present application also provides a network device, as shown in FIG. 18 , including a processor 181 and a machine-readable storage medium 182.
  • the machine-readable storage medium 182 stores 181 executes the machine-executable instructions, and the processor 181 is prompted by the machine-executable instructions to implement any one of the above-mentioned steps of the message transmission method applied to the controller.
  • the machine-readable storage medium may include a random access memory (Random Access Memory, RAM), and may also include a non-volatile memory (Non-Volatile Memory, NVM), such as at least one magnetic disk memory.
  • NVM non-Volatile Memory
  • the machine-readable storage medium may also be at least one storage device located away from the aforementioned processor.
  • the processor can be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; it can also be a digital signal processor (Digital Signal Processor, DSP), an application-specific integrated circuit ( Application Specific Integrated Circuit, ASIC), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • CPU Central Processing Unit
  • NP Network Processor
  • DSP Digital Signal Processor
  • ASIC Application Specific Integrated Circuit
  • FPGA Field-Programmable Gate Array
  • a computer-readable storage medium is also provided, and a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, any of the above-mentioned applications can be realized.
  • a computer program is also provided, which, when run on a computer, causes the computer to execute any of the above-mentioned steps of the message transmission method applied to the first network device, or the above-mentioned Any one of the steps of the message transmission method applied to the controller.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server, or data center by wired (eg, coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • the available medium may be a magnetic medium (such as a floppy disk, a hard disk, or a magnetic tape), an optical medium (such as a DVD), or a semiconductor medium (such as a Solid State Disk (SSD)).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请实施例提供了一种报文传输方法及装置,涉及网络技术领域,应用于第一网络设备,该方法包括:接收第二网络设备发送的报文;缓存所接收的报文预设时长后,转发所接收的报文。应用本申请实施例提供的技术方案,提高了确定性传输对WAN的适应性。

Description

一种报文传输方法及装置 技术领域
本申请涉及网络技术领域,特别是涉及一种报文传输方法及装置。
背景技术
在“智能电网”、“远程医疗”、“影音娱乐”和“工业远程控制”等网络应用场景中需要确定性传输报文,以实现确定的时延和抖动。然而,目前的确定性传输对报文传输路径上的设备要求较高,因此,目前的确定性传输对复杂的广域网(Wide Area Network,WAN)的适应性较差。
发明内容
本申请实施例的目的在于提供一种报文传输方法及装置,以提高确定性传输对WAN的适应性。具体技术方案如下:
第一方面,本申请实施例提供了一种报文传输方法,应用于第一网络设备,所述方法包括:
接收第二网络设备发送的报文;
缓存所接收的报文预设时长后,转发所接收的报文。
可选的,所述方法还包括:
对所接收的报文进行重组处理;重组处理后,属于同一流的报文顺序排列。
可选的,所述对所述接收的报文进行重组处理的步骤,包括:
根据第一映射规则,对所述接收的报文进行重组处理。
可选的,所述第一映射规则包括调度队列;所述调度队列用于缓存同一流的报文。
可选的,所述第一映射规则包括调度周期,所述调度周期用于指示报文转发的时间段;
所述缓存所接收的报文预设时长后,转发所接收的报文的步骤,包括:
在达到所接收的报文的调度周期后,缓存所接收的报文预设时长后,转发所接收的报文。
可选的,对于同一流,所述第一网络设备的调度周期与所述第二网络设备的调度周期的时间差大于等于目标时延,所述目标时延为所述第一网络设备与所述第二网络设备之间的时延。
可选的,所述第一映射规则包括所述预设时长。
可选的,所述报文的报文头中携带所述第一映射规则。
可选的,所述报文的报文头中携带五元组,所述五元组用于确定所述报文所属流;或者,
所述报文的报文头中携带目标流标识,所述流标识用于确定所述目标报文所属流。
可选的,所述第一网络设备和所述第二网络设备的调度频率相同,所述调度频率为划 分调度周期的频率。
可选的,所述方法还包括:
接收所述第二网络设备发送的遥测报文;所述遥测报文用于探测所述第二网络设备至第一网络设备之间每条路径的服务质量;
向控制器发送所述遥测报文。
可选的,所述服务质量包括时延和抖动;
所述遥测报文的尾部携带途径的各个网络设备的时间戳。
第二方面,本申请实施例提供了一种报文传输方法,应用于控制器,所述方法包括:
向第一网络设备发送第一映射规则;所述第一映射规则用于指示所述第一网络设备缓存所接收的第二网络设备发送的报文预设时长后,转发所接收的报文。
可选的,所述方法还包括:
向第二网络设备发送第二映射规则;
所述第一映射规则和第二映射规则包括调度周期,所述调度周期用于指示报文转发的时间段;
对于同一流,所述第一网络设备的调度周期与所述第二网络设备的调度周期的时间差大于等于目标时延,所述目标时延为所述第一网络设备与所述第二网络设备之间的时延。
可选的,所述方法还包括:
接收所述第一网络设备发送的遥测报文,所述遥测报文用于探测所述第二网络设备至第一网络设备之间每条路径的服务质量;
根据所述遥测报文携带的信息,确定所述每条路径的服务质量。
可选的,所述服务质量包括时延和抖动;所述遥测报文的尾部携带途径的各个网络设备的时间戳。
可选的,在向第一网络设备发送第一映射规则之前,所述方法还包括:
接收所述第二网络设备发送的请求报文,所述请求报文用于请求所述第二网络设备至第一网络设备之间传输报文的映射规则;
根据所述请求报文,确定所述第一映射规则。
可选的,所述请求报文携带目标传输参数;
所述根据所述请求报文,确定所述第一映射规则的步骤,包括:
根据第一网络设备至第二网络设备之间每条路径的服务质量,确定服务质量满足所述目标传输参数的所述第一映射规则。
第三方面,本申请实施例提供了一种报文传输装置,应用于第一网络设备,所述装置包括:
第一接收单元,用于接收第二网络设备发送的报文;
转发单元,用于缓存所接收的报文预设时长后,转发所接收的报文。
第四方面,本申请实施例提供了一种报文传输装置,应用于控制器,所述装置包括:
第一发送单元,用于向第一网络设备发送第一映射规则;所述第一映射规则用于指示所述第一网络设备缓存所接收的第二网络设备发送的报文预设时长后,转发所接收的报文。
第五方面,本申请实施例提供了一种网络设备,包括处理器和机器可读存储介质,所述机器可读存储介质存储有能够被所述处理器执行的机器可执行指令,所述处理器被所述机器可执行指令促使:实现上述第一方面提供的任一报文传输方法步骤。
第六方面,本申请实施例提供了一种控制器,包括处理器和机器可读存储介质,所述机器可读存储介质存储有能够被所述处理器执行的机器可执行指令,所述处理器被所述机器可执行指令促使:实现上述第二方面提供的任一报文传输方法步骤。
第七方面,本申请实施例提供了一种计算机可读存储介质,所述计算机可读存储介质内存储有计算机程序,所述计算机程序被处理器执行时实现上述第一方面或第二方面提供的任一报文传输方法步骤。
第八方面,本申请实施例还提供了一种计算机程序,当其在计算机上运行时,使得计算机执行上述第一方面或第二方面提供的任一报文传输方法步骤。
本申请实施例有益效果:
本申请实施例提供的技术方案中,第一网络设备缓存接收的报文预设时长。在第一网络设备缓存所接收的报文的预设时长内,第一网络设备可以接收与该报文属于同一流的其他报文。这样,当缓存接收的报文预设时长后,第一网络设备转发该报文时,可以减小同一流的报文转发所带来的抖动,实现确定性传输。可见,本申请实施例提供的技术方案中,通过接收报文侧的网络设备对报文进行缓存,即可实现确定性传输,该确定性传输的方式,对传输路径上的其他网络设备没有要求。这使得本申请实施例提供的技术方案能够更好的复杂的WAN,提高了确定性传输对WAN的适应性。
当然,实施本申请的任一产品或方法并不一定需要同时达到以上所述的所有优点。
附图说明
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,还可以根据这些附图获得其他的实施例。
图1为本申请实施例提供的WAN的一种示意图;
图2为本申请实施例提供的报文传输方法的第一种流程示意图;
图3为本申请实施例提供的报文传输方法的第二种流程示意图;
图4为本申请实施例提供的接收的报文的一种示意图;
图5为本申请实施例提供的报文传输方法的第三种流程示意图;
图6为本申请实施例提供的报文传输方法的第四种流程示意图;
图7为本申请实施例提供的报文传输方法的第五种流程示意图;
图8为本申请实施例提供的报文传输方法的第六种流程示意图;
图9为本申请实施例提供的WAN的另一种示意图;
图10为本申请实施例提供的报文传输方法的第七种流程示意图;
图11为本申请实施例提供的报文传输方法的第八种流程示意图;
图12为本申请实施例提供的INT报文的转发的一种示意图;
图13为本申请实施例提供的报文传输方法的第九种流程示意图;
图14为本申请实施例提供的报文传输方法的第十种流程示意图;
图15为本申请实施例提供的报文传输装置的第一种结构示意图;
图16为本申请实施例提供的报文传输装置的第二种结构示意图;
图17为本申请实施例提供的网络设备的一种结构示意图;
图18为本申请实施例提供的控制器的一种结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员基于本申请所获得的所有其他实施例,都属于本申请保护的范围。
下面对本申请实施例中出现的词语进行解释说明。
时间敏感网络(Time Sensitive Network,TSN):一组以太网标准,通过精准时间同步和定时调度等核心技术,实现时间同步的低延迟流服务,为系统内各单元提供低时延的等时的标准数据,从而为控制、测量、配置、用户界面(User Interface,UI)和文件交换基础架构等的融合提供基础。
时隙:时间按等分方式分成一个个时隙,是TSN中的最小调度单位。
确定性网络:是指保证业务的确定性带宽、时延、抖动和丢包率指标的网络;确定性网络技术是一种新型的服务质量(Quality of Service,QoS)保障技术。
在“智能电网”、“远程医疗”、“影音娱乐”和“工业远程控制”等网络应用场景中需要确定性传输报文,以实现确定的时延和抖动。此时,这些网络可以称为确定性网络。
对确定性网络的需求主要来自两方面:
一、兼容以太网标准:在工业自动化和智能制造等传统场景,需要用以太网统一替代几十种现场总线和实时以太网标准,融合信息技术(Information Technology,IT)网络和运营技术(Operational Technology,OT)网络,实现尽力而为流与工业时延敏感流的共网传输,降低成本。
二、承载确定性业务:随着机器与机器间通信流量激增,需要在自动驾驶、远程手术和全息通信等新兴网络应用场景中,结合第五代移动通信技术(5th Generation Mobile  Communication Technology,5G)等技术,打造网络里的超级高铁,实现确定性业务的端到端传输,简称确定性传输。
传统的互联网和工业网络主要采用以下四种方法,来保证QoS:
a)扩容/轻载:扩容就是扩带宽,让网络处于轻载的状态。现在以太网已经能做到单端口的带宽为400Gbps。
b)流量整形:通过令牌桶和信用整形等技术,对特定端口或者流量进行限速。例如,上游节点出端口的带宽为8Gbps,下游节点空余带宽只有2Gbps,这就要限制上游节点的传输带宽小于2Gbps,以免下游节点发生拥塞。
c)队列调度:是指在交换机的出端口对流量进行调度。首先把报文标记上不同的优先级,然后将报文加入对应的优先级队列,最后采用不同的队列调度算法对报文进行处理。比如严格优先级(Strict Priority,SP)算法和加权循环调度(Weighted Round Robin,WRR)算法等。
其中,SP算法严格按照队列优先级的高低顺序进行调度。只有高优先级队列中的报文全部调度完毕后,低优先级队列才有调度。
WRR算法会给每个队列一个权重,按权重的比例依次进行转发,以免低优先级的流量长时间等待。
d)拥塞控制:当流量过多,缓冲队列的缓存空间不足时,网络中会出现拥塞丢包,这就需要进行拥塞控制。目前,可采用显式拥塞通知(Explicit Congestion Notification,ECN)或数据中心传输控制协议(Data Center Transmission Control Protocol,DCTCP)等基于显式拥塞标记或者Timely、Swift等基于往返时延(Round-Trip Time,RTT)的拥塞控制方法探测拥塞,让直至发送端的上游节点降低发送报文的速率。
以上保障QoS的技术方案存在如下问题:
1)缺少有界时延抖动保证:由于是统计复用出端口的带宽资源,缺少时延维度的QoS保障机制,尽力而为转发总是会存在排队等待和拥塞的情况,业务时延在50ms-1s的量级,并存在长尾时延。
2)难以应对聚播和突发流量:由于发送端的流量大小和发报文的时间不可控,网络中存在多条数据流在下游节点汇聚(即聚播)以及某时刻流量激增(即流量突发)的现象,导致网络中发生拥塞丢包。
为了解决上面两个问题,相关技术中引入时分复用(Time Division Multiplexing,TDM)概念,例如TNS,实现时钟同步和时隙规划,简而言之,全网按统一的节拍来调度转发报文,从而实现确定的时延和抖动。
(1)时钟同步:即全网时钟同步,终端和交换机的时钟都相同,网卡也要给报文打上硬时间戳。
目前有两种时钟同步方式:一种是主从模式,选出一个最精准的时钟作为主时钟,其 他从时钟都与主时钟同步;一种是投票模式,例如,一个域内有9台设备,5台现在时钟是1:00,4台是1:01,按照少数服从多数的原则,将9台设备都调整为1:00。
(2)时隙规划:时隙一般是指交换机出端口的时间维度的传输资源。
例如,某交换机出端口的带宽为1Gbps,一个报文有1500字节(Byte),也就是12000比特(bit),该报文的传输就占用该出端口某一段12微秒(μs)的时隙资源。而占用哪一段时隙资源,由该报文的传输开始时间决定。
由于工业流量大多是周期性发送的小于最大传输单元(Maximum Transmission Unit,MTU)的报文,所以可以控制终端发送报文的开始时间,通过全局时隙规划(即时分复用),让各个报文只在提前算好的时刻被“触发”发送,保证其在每跳的出端口传输时占用的时隙互不冲突,从而避免了聚播和突发流量的产生,实现“准时准确”传输。
上述基于TSN的确定性传输,有以下缺点:
1、网络跨度较小:上述基于TSN的确定性传输只适合二层网络转发,确定性网络相当于一个小范围的局域网。
2、对网络设备要求严格:时钟同步下,各网络设备间必须保持同一频率和时间。
3、沿途的网络设备都必须支持TSN,如果其中一台网络设备不支持TSN,将无法起到端对端确定性传输的效果。
为了解决上述问题,相关技术中还引入了基于分段路由的周期具化的排队转发(Cyclic Specific Queuing and Forwarding,CSQF)机制。
控制器为各个网络设备分配分段标识(Segmented Identification,SID),并指定SID对应的出端口和转发周期。网络设备对报文头进行解析,得到报文中携带的SID,进而确定具体的出端口和转发周期,按照确定的转发周期,通过确定的出端口转发报文。
上述基于CSQF机制的报文传输方法,能够解决网络跨度较小,但是其仍然存在如下缺点:沿途的网络设备都要支持CSQF机制。
实际网络是非常复杂的,源终端和目的终端之间跨越的是WAN,源终端和目的终端之间很多的网络设备,这些网络设备很难做到都要支持CSQF机制。这使得相关技术中,确定性传输对WAN的适应性较差。
为提高确定性传输对WAN的适应性,本申请实施例提供了一种报文传输方法,该方法可以应用于如图1所示的WAN,该WAN包括控制器和网络设备R1-R9,图1中仅以9个网络设备为例进行说明,并不起限定作用。
其中,网络设备可以为路由器或交换机等。控制器可以为软件定义网络(Software Defined Network,SDN)控制器,也可以采集器等,对此不进行限定。控制器用于对整个WAN的网络设备进行管理,进行确定性传输的路径规划,并进行确定性传输的带宽预留。
图1所示的WAN中,终端A与网络设备R1连接,终端B与网络设备R9连接,终端A和终端B之间要跨越WAN。当终端A需要与终端B进行端对端的确定性传输时,终端A为源终端, 终端B为目的终端,与终端A连接的网络设备R1以及与终端B连接的网络设备R9可以理解为网关设备,网络设备R1和网络设备R9为端对端确定性传输的关键节点,二者调度转发的频率相同。
基于图1所示WAN,本申请实施例提供了一种报文传输方法,如图2所示,该方法应用于第一网络设备。其中,第一网络设备可以为WAN中的任一网络设备。上述方法报文传输方法包括如下步骤:
步骤S21,接收第二网络设备发送的报文。
步骤S22,缓存所接收的报文预设时长后,转发所接收的报文。
本申请实施例提供的技术方案中,第一网络设备缓存接收的报文预设时长。在第一网络设备缓存所接收的报文的预设时长内,第一网络设备可以接收与该报文属于同一流的其他报文。这样,当缓存接收的报文预设时长后,第一网络设备转发该报文时,可以减小同一流的报文转发的抖动,实现确定性传输。可见,本申请实施例提供的技术方案中,通过接收报文侧的网络设备对报文进行缓存,即可实现确定性传输,该确定性传输的方式,对传输路径上的其他网络设备没有要求。这使得本申请实施例提供的技术方案能够更好的复杂的WAN,提高了确定性传输对WAN的适应性。
上述步骤S21中,第二网络设备可以为WAN中的任一网络设备。第二网络设备向其他网络设备发送报文。该报文可以为终端发送给第二网络设备的,也可以为第二网络设备自身生成的。
上述步骤S22中,第一网络设备接收到报文后,缓存所接收的报文,在缓存了预设时长后,转发所接收的报文。
其中,预设时长可以根据实际需求进行设定。例如,预设时长可以为10微秒(μs)、20μs或30μs等。
在本申请的一个实施例中,为了减少同一流的报文转发的抖动,本申请实施例还提供了一种报文传输方法,如图3所示,该方法还可以包括步骤S220。
步骤S220,对所接收的报文进行重组处理;重组处理后,属于同一流的报文顺序排列。
本申请实施例中,流可以数据流,也可以为控制流。
一个可选的实施例中,为了便于区分不同的流,报文的报文头中可以携带五元组,五元组用于确定报文所属流。
另一个可选的实施例中,为了更为准确地区分不同的流,报文的报文头中可以携带流标识,流标识用于确定报文所属流。
第一网络设备接收到报文,对所接收的报文进行重组处理;重组处理后,属于同一流的报文顺序排列,也就是,实现乱序恢复。
例如,如图4所示的接收的报文的示意图。图4中,矩形框表示报文,数字编号相同的报文为同一流的的报文。对于同一流的报文,第一网络设备并不是顺序接收的,如图4的 左侧所示,第一网络设备先接收到流1的一个报文,之后接收了一个流2的报文和一个流3的报文后,才接收到一个流标1的报文。第一网络设对所接收的报文进行重组处理,使得同一流的报文顺序排列,如图4的右侧所示。
由于不同网络设备间可能会传输多条流的报文,网络设备接收不同条流的报文的顺序是不固定。第一网络设备接收到报文,对所接收的报文进行重组处理;重组处理后,属于同一流的报文顺序排列,可以进一步降低同一流的报文转发的抖动。
在本申请的一个实施例中,第一网络设备可以预先存储了第一映射规则,根据第一映射规则,对所接收的报文进行重组处理。
例如,第一网络设备接收到报文后,确定所接收的报文所属流对应的第一映射规则,进而按照第一映射规则,对所接收的报文进行重组处理。
一个可选的实施例中,第一映射规则可以包括调度队列;调度队列用于缓存同一流的报文。
这种情况下,第一网络设备可以将同一流的报文缓存至同于调度队列,进而实现乱序恢复
一个可选的实施例中,第一映射规则可以包括调度周期,调度周期用于指示报文转发的时间段。
这种情况下,上述步骤S22可以为:在达到所接收的报文的调度周期后,缓存所接收的报文预设时长后,转发所接收的报文。
例如,预设时长为1个调度周期,报文的调度周期为第X调度周期,在第X至X+1调度周期转发该报文。
通过设置调度周期,周期性对报文转发进行控制,便于实现报文的同步,并减少报文传输的抖动等。
本申请实施例中,对于同一流,第一网络设备的调度周期与第二网络设备的调度周期的时间差可以大于等于目标时延,目标时延为第一网络设备与第二网络设备之间的时延。这样可以保证第一网络设备能够在接收到来自第二网络设备的报文后,较快速的处理报文,降低第一网络设备与第二网络设备间的时延。
一个可选的实施例中,为便于对所接收的报文进行控制,降低抖动,第一映射规则可以包括预设时长。
为了进一步便于对所接收的报文进行控制,降低抖动,第二网络设备向第一网络设备所发送报文的报文头中可以携带第一映射规则。
一个可选的实施例中,第一网络设备和第二网络设备的调度频率相同,调度频率为划分调度周期的频率。这样,可以进一步确保端对端的抖动。
在本申请的一个实施例中,还提供了一种报文传输方法,如图5所示,该方法可以包括如下步骤:
步骤S51,接收第二网络设备发送的遥测报文;遥测报文用于探测所第二网络设备至第一网络设备之间每条路径的服务质量。
其中,服务质量可以包括但不限于时延和抖动等。该遥测报文可以为带内网络遥测(In-band Network Telemetry,INT)报文。遥测报文的尾部携带途径的各个网络设备的时间戳。
步骤S52,向控制器发送遥测报文。
通过本申请实施例,便于控制器确定每条路径的最大时延、具体的封装和处理操作等,保证确定性传输服务在QoS约束范围内有效。
基于上述应用于第一网络设备的报文传输方法,本申请实施例还提供了一种报文传输方法,如图6所示,该方法应用于控制器,包括如下步骤:
步骤S61,向第一网络设备发送第一映射规则;第一映射规则用于指示第一网络设备缓存所接收的第二网络设备发送的报文预设时长后,转发所接收的报文。
控制器可以对WAN进行监控。一个可选的实施例中,当确定第一网络设备上的映射规则无法满足第二网络设备和第二网络设备间的报文传输需求时,控制器可以确定新的映射规则,即第一映射规则,向第一网络设备发送第一映射规则。
另一个可选的实施例中,控制器可以通过如下方式确定第一映射规则,如图7所示:
步骤S71,接收第二网络设备发送的请求报文,请求报文用于请求第二网络设备至第一网络设备之间传输报文的映射规则。
步骤S72,根据请求报文,确定第一映射规则。
本申请实施例中,控制器在接收到第二网络设备发送的请求报文时,确定第一映射规则,进而执行步骤S61,向第一网络设备发送第一映射规则,实现第二网络设备至第一网络设备之间的确定性传输。
利用本申请实施例,控制器可以根据实现需求下发映射规则,节约了网络资源。
一个可选的实施例中,上述请求报文携带目标传输参数;根据第一网络设备至第二网络设备之间每条路径的服务质量,确定服务质量满足目标传输参数的路径以及第一映射规则。之后,第二网络设备沿所确定的路径,向第一网络设备转发报文,第一网络设备根据第一映射规则转发,可以实现用户需求的确定性传输。
其中,目标传输参数可以报文传输需要的带宽和报文传输的时延等。第一映射规则
一个可选的实施例中,本申请实施例还提供了一种报文传输方法,如图8所示,可以包括如下步骤:
步骤S81,接收第一网络设备发送的遥测报文,遥测报文用于探测第二网络设备至第一网络设备之间每条路径的服务质量;
步骤S82,根据遥测报文携带的信息,确定每条路径的服务质量。
通过本申请实施例,控制器可以确定每条路径的最大时延、具体的封装和处理操作等, 保证确定性传输服务在QoS约束范围内有效。
在本申请的一个实施例中,控制器还可以向第二网络设备发送第二映射规则。其中,第一映射规则和第二映射规则包括调度周期,调度周期用于指示报文转发的时间段;
对于同一流,第一网络设备的调度周期与所第二网络设备的调度周期的时间差大于等于目标时延,目标时延为第一网络设备与第二网络设备之间的时延。
这样可以保证第一网络设备能够在接收到来自第二网络设备的报文后,较快速的处理报文,降低第一网络设备与第二网络设备间的时延。
下面结合图1所示WAN对本申请实施例提供的报文传输方法进行说明。终端A与终端B之间端对端的确定性传输可以包括:
终端A向网络设备R1发送报文1,该报文1携带流标识(Flow Identity,FlowID)9。
网络设备R1接收到报文1后,根据预先存储的流标识、路径和映射规则的对应关系,确定流标识1对应的路径1(如图1中的网络设备R1→R3→R7→R9所指示的路径)以及映射规则1。图1中,SA表示源地址,DA表示目的地址,带箭头的虚线指示报文的传输路径。报文中的F9、Q7和T3等表示映射规则。
其中,映射规则为指示报文的转发规则。映射规则可以根据实际需求设定。该映射规则可以包括但不限于流标识对应的调度队列、调度周期、和缓存时间等信息。
例如,映射规则包括FX1、QX2和TX3。FX1为FlowID;QX2为调度队列标识,表示第X2队列,即将携带FlowID X1的报文映射至第X2队列;TX3为调度周期,表示第X3调度周期,即携带FlowID X1的报文在第X3调度周期转发。映射规则还可以包括缓存时间(即上述预设时长),以便于实现报文的同步,并减少报文传输的抖动等。例如,缓存时间为1个调度周期,此时,上述映射规则指示:携带FlowID X1的报文映射至第X2队列,在第X3至X3+1调度周期转发第X2队列中缓存的报文。
假设,映射规则1包括F9、Q7和T3,缓存时间为1个调度周期,路径1为如图1中的网络设备R1→R3→R7→R9所指示的路径。网络设备R1按照映射规则1,沿路径1向网络设备R9转发报文1,即携带FlowID 9的报文1映射至第7队列,在第3-4调度周期,向网络设备R9转发第7队列中缓存的报文1。
一个示例中,网络设备R1可以在报文1的报文头中封装上述映射规则1,如图1所示,以便于网络设备R9可以准确的按照映射规则1转发报文1,实现确定性传输。
图1中,仅以报文的报文头中映射规则包括F9、Q7和T3为例进行说明,并不起限定作用。当需要基于SRv6技术进行报文转发是,图1所示报文的报文头中还可以包括路径上途径的各个网络设备的SID等信息。
另一个示例中,为了降低报文传输的压力,网络设备R1可以不在报文1的报文头中封装上述映射规则1,如图9所示WAN,SA表示源地址,DA表示目的地址,带箭头的虚线指示报文的传输路径,报文头中携带的R9表示网络设备R9的SID,报文头中携带的R7表示网 络设备R7的SID,报文头中携带的R3表示网络设备R3的SID。网络设备R9根据本地存储的流标识和映射规则的对应关系,确定相应的映射规则1。图9仅以基于SRv6技术进行报文转发为例进行转发为例进行说明。若采用其他技术进行报文转发,报文头中可以不携带SID。
网络设备R9接收到报文1后,按照映射规则1,缓存报文1预设时长后,向终端B发送报文1,进而实现确定性传输。
上述实施例中,仅以报文中携带流标识为例进行说明。如不采用流标识,也可以区分不同的流,报文中也可以不携带流标识。
如图10所示,本申请实施例提供的报文传输方法的第七种流程示意图,该方法应用于与源终端连接的第二网络设备,包括如下步骤:
步骤S101,获取源终端发送的目标报文,目标报文携带目标流标识。
本申请实施例中,源终端向第二网络设备发送报文,即目标报文。该目标报文携带的流标识为目标流标识。
步骤S102,根据预先存储的流标识、路径和映射规则的对应关系,确定目标流标识对应的目标路径以及目标映射规则。
本申请实施例中,第二网络设备中预先存储了流标识、路径和映射规则的对应关系。在获取到目标报文后,第二网络设备在预先存储的流标识、路径和映射规则的对应关系中,查找包括目标流标识的对应关系;在查找到对应关系后,第二网络设备将查找到的对应关系中包括的路径作为目标流标识对应的目标路径,将查找到的对应关系中包括的映射规则作为目标映射规则。
步骤S103,按照目标映射规则,沿目标路径向与第二网络设备的调度转发的频率相同的第一网络设备转发目标报文,以使第一网络设备按照目标映射规则,向与第一网络设备连接的目的终端发送目标报文。
本申请实施例中,第一网络设备和第二网络设备报文调度转发的频率相同,例如,第一网络设备和第二网络设备均支持CSQF机制,第一网络设备和第二网络设备按相同的调度频率划分出很多调度周期(Cycle)。这样就可以确保端对端的网络抖动,并通过带宽预留和INT测量来决定时延。在获取到目标路径以及目标映射规则后,第二网络设备按照目标映射规则,沿目标路径向第一网络设备转发目标报文。
在本申请的一个实施例中,WAN可以基于分段路由(Segment Routing,SR)确定路径。例如,控制器可以利用基于第六版互联网协议的分段路由(Segment Routing Internet Protocol Version 6,SRv6)技术为各个网络设备分别分段标识(Segment Identifier,SID),并基于各个网络设备的SID,完成端对端可视、路径规划和带宽预留等。各个网络设备利用SID,转发接收的报文。
本申请实施例中,目标路径上除第一网络设备和第二网络设备外,还可以包括一个或多个网络设备,这一个或多个网络设备接收到目标报文后,不需要确定目标报文的具体转 发周期,可以直接转发目标报文。第一网络设备接收到目标报文后,可以基于CSQF机制,按照目标映射规则,向目的终端发送目标报文。
本申请实施例提供的技术方案中,仅对与源终端连接的第二网络设备和与目的终端连接的第一网络设备存在要求,即二者调度转发的频率要相同,如只需第一网络设备和与第二网络设备支持CSQF机制,对第一网络设备和第二网络设备之间的其他网络设备没有要求,即可实现确定的时延和抖动,实现确定性传输。这使得本申请实施例提供的技术方案能够更好的复杂的WAN,提高了确定性传输对WAN的适应性。
在本申请的一个实施例中,本申请实施例还提供了一种报文传输方法,如图11所示,该方法中,在步骤S101之前还可以包括如下步骤:
步骤S1010,向控制器发送来自源终端的传输请求报文,传输请求报文携带目标传输参数,以使控制器根据预先存储的第一网络设备至第二网络设备之间每条路径的服务质量,确定满足目标传输参数的目标路径和目标映射规则。
本申请实施例中,当源终端需要向目的终端确定性传输报文时,源终端向第二网络设备发送传输请求报文,进而第二网络设备向控制器发送传输请求报文,该传输请求报文携带目标传输参数,目标传输参数可以包括但不限于:FlowID、报文传输需要的带宽和报文传输的时延等。
控制器中预先存储了第一网络设备至第二网络设备之间每条路径的服务质量。其中,一条路径的服务质量包括该路径的剩余带宽、该路径的时延和该路径的队列资源等。
控制器接收到传输请求报文后,从传输请求报文中获取到目标传输参数;根据预先存储的第一网络设备至第二网络设备之间每条路径的服务质量,确定服务质量满足目标传输参数的目标路径,并确定目标映射规则。
步骤S1011,接收控制器下发的目标路径和目标映射规则,并存储目标流标识、目标路径和目标映射规则的对应关系。
本申请实施例中,在确定目标路径和目标映射规则后,控制器向第二网络设备下发目标路径和目标映射规则。第二网络设备接收控制器下发的目标路径和目标映射规则,进而存储目标流标识、目标路径和目标映射规则的对应关系。
之后,第二网络设备基于存储的目标流标识、目标路径和目标映射规则的对应关系,转发携带目标流标识的报文。
本申请实施例中,控制器收集了第一网络设备至第二网络设备之间的多条路径的服务质量,对路径进行了统一规划,进而实现确定性传输。
在本申请的一个实施例中,在确定目标路径和目标映射规则后,控制器向第一网络设备下发相应的目标映射规则。以使第一网络设备存储目标流标识和目标映射规则的对应关系,以实现准确的确定性传输。这里,第一网络设备存储的目标映射规则与第二网络设备存储的目标映射规则相差目标时延。目标时延为第一网络设备与第二网络设备之间的时 延。
在本申请的一个实施例中,为了实现确定性传输,第二网络设备可以周期性沿第一网络设备至第二网络设备之间每条路径,分别向第一网络设备发送遥测报文。该遥测报文用于探测第一网络设备至第二网络设备之间每条路径的服务质量。
第一网络设备将接收的遥测报文上送至控制器。控制器在接收到第一网络设备上送的遥测报文后,从遥测报文中获取第一网络设备至第二网络设备之间每条路径的服务质量,进而存储第一网络设备至第二网络设备之间每条路径的服务质量。
本申请实施例中,遥测报文可以为带内网络遥测(In-band Network Telemetry,INT)报文。沿第一网络设备至第二网络设备的路径转发INT报文时,途径的网络设备在INT报文中插入该网络设备的设备信息、以及该网络设备接收INT报文的时间戳和发送INT报文的时间戳。其中,该网络设备接收INT报文的时间戳和发送INT报文的时间戳统称为时间戳,该时间戳位于INT报文的尾部,网络设备的设备信息可以位于INT报文的报文头中。
例如图12所示的INT报文的转发示意图,图12中,SA表示源地址,DA表示目的地址,带箭头的虚线指示INT报文的传输路径。沿网络设备R1→R3→R7→R9转发INT报文时,网络设备R1转发INT报文时,在INT报文的尾部插入时间戳TS1,网络设备R3转发INT报文时,在INT报文的尾部插入时间戳TS3,网络设备R7转发INT报文时,在INT报文的尾部插入时间戳TS7,网络设备R9向控制器上送INT报文时,在INT报文的尾部插入时间戳TS9。图12中仅示出了网络设备R1、R7和R9转发的INT报文。
这里,网络设备R1、R3、R7和R9支持INT,并在INT报文中添加了时间戳,而网络设备R2和R8也途径的网络设备,但网络设备R2和R8不支持INT,因此,未在INT报文中添加时间戳。
控制器接收到网络设备R9上送的INT报文后,对该INT报文中携带的时间戳进行分析,可确定网络设备R1→R3→R7→R9路径的时延和抖动,进而完成端对端的QoS探测。这便于控制器确定每条路径的最大时延、具体的封装和处理操作等,保证确定性传输服务在QoS约束范围内有效。
本申请实施例中,为了更为准确的探测端对端的QoS,沿第二网络设备至第一网络设备的路径转发INT报文时,途径的网络设备在向下一跳设备转发网络设备的同时,可以向控制器上送INT报文。当途径的一个网络设备未向控制器上送INT报文时,则确定该网络设备故障。基于此,控制器可以及时的进行告警,以提示该网络设备故障,进而及时对该网络设备进行修复。
基于上述应用于第二网络设备的报文传输方法,本申请实施例还提供了一种报文传输方法,如图13所示,应用于与目的终端连接的第一网络设备,包括如下步骤:
步骤S131,接收与第一网络设备的调度转发的频率相同的第二网络设备发送的目标报文,目标报文携带目标流标识,目标报文为:第二网络设备按照目标流标识对应的目标映 射规则,沿目标路径所发送的来自与第二网络连接的源终端的报文。
步骤S132,按照目标映射规则,向目的终端发送目标报文。
在本申请的一个实施例中,若目标报文携带目标映射规则,则上述步骤S132具体可以为:按照目标报文携带的目标映射规则,向目的终端发送目标报文。
在本申请的另一个实施例中,若目标报文未携带目标映射规则,则上述步骤S132具体可以为:根据预先存储的流标识和映射规则的对应关系,确定目标流标识对应的目标映射规则;按照所确定的目标映射规则,向目的终端发送目标报文。
在本申请的一个实施例中,为实现端对端确定性传输,第一网络设备接收控制器下发的目标映射规则,目标映射规则为:控制器在接收到源终端发送传输请求报文后,根据预先存储的第二网络设备至第一网络设备之间每条路径的服务质量,所确定的满足传输请求报文携带的目标传输参数的映射规则;存储目标流标识和目标映射规则的对应关系。
本申请实施例中,为了准确的存储目标流标识和目标映射规则的对应关系,控制器向第一网络设备下发目标映射规则的同时,还可以向第一网络设备下发目标流标识。
在本申请的一个实施例中,第一网络设备接收来自第二网络设备的遥测报文,遥测报文用于探测第二网络设备至第一网络设备之间每条路径的服务质量;将遥测报文上送至控制器。
其中,遥测报文可以为INT报文,也可以其他类型的遥测报文。
本申请实施例提供的提供技术方案中,仅对与源终端连接的第二网络设备和与目的终端连接的第一网络设备存在要求,即二者调度转发的频率要相同,如只需第一网络设备和与第二网络设备支持CSQF机制,对第一网络设备和第二网络设备之间的其他网络设备没有要求,即可实现确定的时延和抖动,实现确定性传输。这使得本申请实施例提供的技术方案能够更好的复杂的WAN,提高了确定性传输对WAN的适应性。
在本申请的一个实施例中,本申请实施例还提供了一种报文传输方法,如图14所示,该方法中,步骤S132可以细化为步骤S1321和S14322。
步骤S1321,根据目标流标识,对目标报文重新排序,使得目标报文与目标流标识对应的其他报文相邻。
步骤S1322,按照目标映射规则,向目的终端发送重新排序后的目标报文。
本申请实施例提供的技术方案中,第一网络设备利用流标识,对报文重新排序,即对报文进行重组,实现乱序恢复,保证属于同一数据流的报文顺序发送,减小抖动,进而实现端对端确定性传输。
与上述报文传输方法对应,本申请实施例还提供了一种报文传输装置,如图15所示,应用于第一网络设备,所述方法包括:
第一接收单元151,用于接收第二网络设备发送的报文;
转发单元152,用于缓存所接收的报文预设时长后,转发所接收的报文。
可选的,所述装置还包括:
重组单元,用于对所接收的报文进行重组处理;重组处理后,属于同一流的报文顺序排列。
可选的,所述重组单元,具体用于:
根据第一映射规则,对所述接收的报文进行重组处理。
可选的,所述第一映射规则包括调度队列;所述调度队列用于缓存同一流的报文。
可选的,所述第一映射规则包括调度周期,所述调度周期用于指示报文转发的时间段;
所述转发单元,具体用于:
在达到所接收的报文的调度周期后,缓存所接收的报文预设时长后,转发所接收的报文。
可选的,对于同一流,所述第一网络设备的调度周期与所述第二网络设备的调度周期的时间差大于等于目标时延,所述目标时延为所述第一网络设备与所述第二网络设备之间的时延。
可选的,所述第一映射规则包括所述预设时长。
可选的,所述报文的报文头中携带所述第一映射规则。
可选的,所述报文的报文头中携带五元组,所述五元组用于确定所述报文所属流;或者,
所述报文的报文头中携带目标流标识,所述流标识用于确定所述目标报文所属流。
可选的,所述第一网络设备和所述第二网络设备的调度频率相同,所述调度频率为划分调度周期的频率。
可选的,所述装置还包括:
第二接收单元,用于接收所述第二网络设备发送的遥测报文;所述遥测报文用于探测所述第二网络设备至第一网络设备之间每条路径的服务质量;
向控制器发送所述遥测报文。
可选的,所述服务质量包括时延和抖动;
所述遥测报文的尾部携带途径的各个网络设备的时间戳。
本申请实施例提供的技术方案中,第一网络设备缓存接收的报文预设时长。在第一网络设备缓存所接收的报文的预设时长内,第一网络设备可以接收与该报文属于同一流的其他报文。这样,当缓存接收的报文预设时长后,第一网络设备转发该报文时,可以减小同一流的报文转发所带来的抖动,实现确定性传输。可见,本申请实施例提供的技术方案中,通过接收报文侧的网络设备对报文进行缓存,即可实现确定性传输,该确定性传输的方式,对传输路径上的其他网络设备没有要求。这使得本申请实施例提供的技术方案能够更好的复杂的WAN,提高了确定性传输对WAN的适应性。
与上述报文传输方法对应,本申请实施例还提供了一种报文传输装置,如图16所示, 应用于控制器,所述装置包括:
第一发送单元161,用于向第一网络设备发送第一映射规则;所述第一映射规则用于指示所述第一网络设备缓存所接收的第二网络设备发送的报文预设时长后,转发所接收的报文。
可选的,所述装置还包括:
第二发送单元,用于向第二网络设备发送第二映射规则;
所述第一映射规则和第二映射规则包括调度周期,所述调度周期用于指示报文转发的时间段;
对于同一流,所述第一网络设备的调度周期与所述第二网络设备的调度周期的时间差大于等于目标时延,所述目标时延为所述第一网络设备与所述第二网络设备之间的时延。
可选的,所述装置还包括:
第一接收单元,用于接收所述第一网络设备发送的遥测报文,所述遥测报文用于探测所述第二网络设备至第一网络设备之间每条路径的服务质量;
第一确定单元,用于根据所述遥测报文携带的信息,确定所述每条路径的服务质量。
可选的,所述服务质量包括时延和抖动;所述遥测报文的尾部携带途径的各个网络设备的时间戳。
可选的,所述装置还包括:
第二接收单元,用于在向第一网络设备发送第一映射规则之前,接收所述第二网络设备发送的请求报文,所述请求报文用于请求所述第二网络设备至第一网络设备之间传输报文的映射规则;
第二确定单元,用于根据所述请求报文,确定所述第一映射规则。
可选的,所述请求报文携带目标传输参数;
所述第二确定单元,具体用于:
根据第一网络设备至第二网络设备之间每条路径的服务质量,确定服务质量满足所述目标传输参数的所述第一映射规则。
本申请实施例提供的技术方案中,第一网络设备缓存接收的报文预设时长。在第一网络设备缓存所接收的报文的预设时长内,第一网络设备可以接收与该报文属于同一流的其他报文。这样,当缓存接收的报文预设时长后,第一网络设备转发该报文时,可以减小同一流的报文转发所带来的抖动,实现确定性传输。可见,本申请实施例提供的技术方案中,通过接收报文侧的网络设备对报文进行缓存,即可实现确定性传输,该确定性传输的方式,对传输路径上的其他网络设备没有要求。这使得本申请实施例提供的技术方案能够更好的复杂的WAN,提高了确定性传输对WAN的适应性。
与上述报文传输方法对应,本申请实施例还提供了一种网络设备,如图17所示,包括处理器171和机器可读存储介质172,机器可读存储介质172存储有能够被处理器171执行的 机器可执行指令,处理器171被机器可执行指令促使:实现上述任一所述应用于第一网络设备的报文传输方法步骤。
与上述报文传输方法对应,本申请实施例还提供了一种网络设备,如图18所示,包括处理器181和机器可读存储介质182,机器可读存储介质182存储有能够被处理器181执行的机器可执行指令,处理器181被机器可执行指令促使:实现上述任一所述应用于控制器的报文传输方法步骤。
机器可读存储介质可以包括随机存取存储器(Random Access Memory,RAM),也可以包括非易失性存储器(Non-Volatile Memory,NVM),例如至少一个磁盘存储器。可选的,机器可读存储介质还可以是至少一个位于远离前述处理器的存储装置。
处理器可以是通用处理器,包括中央处理器(Central Processing Unit,CPU)、网络处理器(Network Processor,NP)等;还可以是数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。
在本申请提供的又一实施例中,还提供了一种计算机可读存储介质,该计算机可读存储介质内存储有计算机程序,所述计算机程序被处理器执行时实现上述任一所述应用于第一网络设备的报文传输方法步骤,或实现上述任一所述应用于控制器的报文传输方法步骤。
在本申请提供的又一实施例中,还提供了一种计算机程序,当其在计算机上运行时,使得计算机执行上述任一所述应用于第一网络设备的报文传输方法步骤,或上述任一所述应用于控制器的报文传输方法步骤。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。
需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或 者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
本说明书中的各个实施例均采用相关的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于装置、网络设备、控制器、计算机可读存储介质和计算机程序实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
以上所述仅为本申请的较佳实施例,并非用于限定本申请的保护范围。凡在本申请的精神和原则之内所作的任何修改、等同替换、改进等,均包含在本申请的保护范围内。

Claims (23)

  1. 一种报文传输方法,其特征在于,应用于第一网络设备,所述方法包括:
    接收第二网络设备发送的报文;
    缓存所接收的报文预设时长后,转发所接收的报文。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    对所接收的报文进行重组处理;重组处理后,属于同一流的报文顺序排列。
  3. 根据权利要求2所述的方法,其特征在于,所述对所接收的报文进行重组处理的步骤,包括:
    根据第一映射规则,对所接收的报文进行重组处理。
  4. 根据权利要求3所述的方法,其特征在于,所述第一映射规则包括调度队列;所述调度队列用于缓存同一流的报文。
  5. 根据权利要求3所述的方法,其特征在于,所述第一映射规则包括调度周期,所述调度周期用于指示报文转发的时间段;
    所述缓存所接收的报文预设时长后,转发所接收的报文的步骤,包括:
    在达到所接收的报文的调度周期后,缓存所接收的报文预设时长后,转发所接收的报文。
  6. 根据权利要求5所述的方法,其特征在于,对于同一流,所述第一网络设备的调度周期与所述第二网络设备的调度周期的时间差大于等于目标时延,所述目标时延为所述第一网络设备与所述第二网络设备之间的时延。
  7. 根据权利要求3所述的方法,其特征在于,所述第一映射规则包括所述预设时长。
  8. 根据权利要求3-7任一项所述的方法,其特征在于,所述报文的报文头中携带所述第一映射规则。
  9. 根据权利要求1-7任一项所述的方法,其特征在于,所述报文的报文头中携带五元组,所述五元组用于确定所述报文所属流;或者,
    所述报文的报文头中携带流标识,所述流标识用于确定所述报文所属流。
  10. 根据权利要求1-7任一项所述的方法,其特征在于,所述第一网络设备和所述第二网络设备的调度频率相同,所述调度频率为划分调度周期的频率。
  11. 根据权利要求1-7任一项所述的方法,其特征在于,所述方法还包括:
    接收所述第二网络设备发送的遥测报文;所述遥测报文用于探测所述第二网络设备至第一网络设备之间每条路径的服务质量;
    向控制器发送所述遥测报文。
  12. 根据权利要求11所述的方法,其特征在于,所述服务质量包括时延和抖动;
    所述遥测报文的尾部携带途径的各个网络设备的时间戳。
  13. 一种报文传输方法,其特征在于,应用于控制器,所述方法包括:
    向第一网络设备发送第一映射规则;所述第一映射规则用于指示所述第一网络设备缓存所接收的第二网络设备发送的报文预设时长后,转发所接收的报文。
  14. 根据权利要求13所述的方法,其特征在于,所述方法还包括:
    向第二网络设备发送第二映射规则;
    所述第一映射规则和第二映射规则包括调度周期,所述调度周期用于指示报文转发的时间段;
    对于同一流,所述第一网络设备的调度周期与所述第二网络设备的调度周期的时间差大于等于目标时延,所述目标时延为所述第一网络设备与所述第二网络设备之间的时延。
  15. 根据权利要求13所述的方法,其特征在于,所述方法还包括:
    接收所述第一网络设备发送的遥测报文,所述遥测报文用于探测所述第二网络设备至第一网络设备之间每条路径的服务质量;
    根据所述遥测报文携带的信息,确定所述每条路径的服务质量。
  16. 根据权利要求13所述的方法,其特征在于,所述服务质量包括时延和抖动;所述遥测报文的尾部携带途径的各个网络设备的时间戳。
  17. 根据权利要求13所述的方法,其特征在于,在向第一网络设备发送第一映射规则之前,所述方法还包括:
    接收所述第二网络设备发送的请求报文,所述请求报文用于请求所述第二网络设备至第一网络设备之间传输报文的映射规则;
    根据所述请求报文,确定所述第一映射规则。
  18. 根据权利要求17所述的方法,其特征在于,所述请求报文携带目标传输参数;
    所述根据所述请求报文,确定所述第一映射规则的步骤,包括:
    根据第一网络设备至第二网络设备之间每条路径的服务质量,确定服务质量满足所述目标传输参数的路径以及所述第一映射规则。
  19. 一种报文传输装置,其特征在于,应用于第一网络设备,所述装置包括:
    第一接收单元,用于接收第二网络设备发送的报文;
    转发单元,用于缓存所接收的报文预设时长后,转发所接收的报文。
  20. 一种报文传输装置,其特征在于,应用于控制器,所述装置包括:
    第一发送单元,用于向第一网络设备发送第一映射规则;所述第一映射规则用于指示所述第一网络设备缓存所接收的第二网络设备发送的报文预设时长后,转发所接收的报文。
  21. 一种网络设备,其特征在于,包括处理器和机器可读存储介质,所述机器可读存储介质存储有能够被所述处理器执行的机器可执行指令,所述处理器被所述机器可执行指令促使:实现权利要求1-12任一所述的方法步骤。
  22. 一种控制器,其特征在于,包括处理器和机器可读存储介质,所述机器可读存储 介质存储有能够被所述处理器执行的机器可执行指令,所述处理器被所述机器可执行指令促使:实现权利要求13-18任一所述的方法步骤。
  23. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质内存储有计算机程序,所述计算机程序被处理器执行时实现权利要求1-12或13-18任一所述的方法步骤。
PCT/CN2021/106623 2021-07-15 2021-07-15 一种报文传输方法及装置 WO2023283902A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
KR1020237040041A KR20230169378A (ko) 2021-07-15 2021-07-15 메시지 전송 방법 및 디바이스
PCT/CN2021/106623 WO2023283902A1 (zh) 2021-07-15 2021-07-15 一种报文传输方法及装置
JP2023571943A JP2024521725A (ja) 2021-07-15 2021-07-15 パケット伝送方法及びパケット伝送装置
EP21949688.2A EP4319055A4 (en) 2021-07-15 2021-07-15 MESSAGE TRANSMISSION METHOD AND APPARATUS
CN202180001884.0A CN113711572A (zh) 2021-07-15 2021-07-15 一种报文传输方法及装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/106623 WO2023283902A1 (zh) 2021-07-15 2021-07-15 一种报文传输方法及装置

Publications (1)

Publication Number Publication Date
WO2023283902A1 true WO2023283902A1 (zh) 2023-01-19

Family

ID=78647593

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/106623 WO2023283902A1 (zh) 2021-07-15 2021-07-15 一种报文传输方法及装置

Country Status (5)

Country Link
EP (1) EP4319055A4 (zh)
JP (1) JP2024521725A (zh)
KR (1) KR20230169378A (zh)
CN (1) CN113711572A (zh)
WO (1) WO2023283902A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116232997A (zh) * 2023-02-10 2023-06-06 中国联合网络通信集团有限公司 数据转发方法、装置及存储介质
CN116545936B (zh) * 2023-07-05 2023-11-03 苏州浪潮智能科技有限公司 拥塞控制方法、系统、装置、通信设备及存储介质

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023123103A1 (zh) * 2021-12-29 2023-07-06 新华三技术有限公司 确定性流传输方法及设备
CN116647894A (zh) * 2022-02-15 2023-08-25 大唐移动通信设备有限公司 数据调度方法、装置、设备及存储介质
CN114844837B (zh) * 2022-04-25 2023-09-26 西安交通大学 多服务队列环境中基于时延的拥塞控制方法和控制装置
CN117014944A (zh) * 2022-04-29 2023-11-07 上海华为技术有限公司 一种报文传输方法以及装置
CN114978754B (zh) * 2022-06-21 2023-09-19 奥特酷智能科技(南京)有限公司 一种tsn异常检测方法及系统
WO2024016327A1 (zh) * 2022-07-22 2024-01-25 新华三技术有限公司 报文传输

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017028545A1 (zh) * 2015-08-14 2017-02-23 中兴通讯股份有限公司 端口队列堵塞的监控方法及系统
CN110166367A (zh) * 2018-02-14 2019-08-23 华为技术有限公司 一种分组网络中控制流量的方法及装置
CN112202685A (zh) * 2017-11-06 2021-01-08 华为技术有限公司 报文转发方法、转发设备和网络设备
CN113037640A (zh) * 2019-12-09 2021-06-25 华为技术有限公司 数据转发方法、数据缓存方法、装置和相关设备

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106301973B (zh) * 2015-05-14 2019-07-23 南宁富桂精密工业有限公司 网络检测方法与使用所述方法的控制器
EP3977692B1 (en) * 2019-05-29 2022-10-12 Telefonaktiebolaget LM Ericsson (publ) Avoiding jitter in a communication system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017028545A1 (zh) * 2015-08-14 2017-02-23 中兴通讯股份有限公司 端口队列堵塞的监控方法及系统
CN112202685A (zh) * 2017-11-06 2021-01-08 华为技术有限公司 报文转发方法、转发设备和网络设备
CN110166367A (zh) * 2018-02-14 2019-08-23 华为技术有限公司 一种分组网络中控制流量的方法及装置
CN112866127A (zh) * 2018-02-14 2021-05-28 华为技术有限公司 一种分组网络中控制流量的方法及装置
CN113037640A (zh) * 2019-12-09 2021-06-25 华为技术有限公司 数据转发方法、数据缓存方法、装置和相关设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4319055A4 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116232997A (zh) * 2023-02-10 2023-06-06 中国联合网络通信集团有限公司 数据转发方法、装置及存储介质
CN116232997B (zh) * 2023-02-10 2024-04-09 中国联合网络通信集团有限公司 数据转发方法、装置及存储介质
CN116545936B (zh) * 2023-07-05 2023-11-03 苏州浪潮智能科技有限公司 拥塞控制方法、系统、装置、通信设备及存储介质

Also Published As

Publication number Publication date
JP2024521725A (ja) 2024-06-04
KR20230169378A (ko) 2023-12-15
EP4319055A1 (en) 2024-02-07
CN113711572A (zh) 2021-11-26
EP4319055A4 (en) 2024-05-29

Similar Documents

Publication Publication Date Title
WO2023283902A1 (zh) 一种报文传输方法及装置
US11245634B2 (en) Time-sensitive networking (TSN) packet forwarding
US11018791B2 (en) Method and device for time-controlled data transmission in a time-sensitive network
JP6032824B2 (ja) パケット交換通信網におけるスケジューリング方法、エンドノード及びコアネットワークスイッチ
TWI756666B (zh) 在封包交換網路中藉由通訊實體之電腦手段實施之方法、及其電腦程式及電腦可讀取之非暫時性記錄媒體、以及封包交換網路之通訊實體
US10819535B2 (en) Method for data packet transmission and/or reception
Imtiaz et al. Approaches to reduce the latency for high priority traffic in IEEE 802.1 AVB networks
CN108282416A (zh) 一种基于数据帧的调度方法和装置
Amari et al. AeroRing: Avionics full duplex ethernet ring with high availability and QoS management
CN115242728B (zh) 一种报文传输方法及装置
WO2013078873A1 (zh) 识别应答报文的方法及设备
US20240214323A1 (en) Packet transmission method and apparatus
CN115643220A (zh) 基于抖动时延的确定性业务传输方法和装置
Cavalieri Modelling and analysing congestion in KNXnet/IP
KR20230173697A (ko) 이더넷 프레임의 송신을 스케줄링하기 위해 패킷 교환 네트워크에서 실시되는 방법, 컴퓨터 프로그램 및 기기
WO2022068617A1 (zh) 流量整形方法及装置
WO2024016327A1 (zh) 报文传输
CN115037399A (zh) 报文转发方法、电子设备和存储介质
Steiner Deterministic Ethernet for real-time and critical applications
CN117596200B (zh) 一种时间敏感网络路由调度方法、电子设备、介质
WO2023241063A1 (zh) 报文处理方法、装置、系统及存储介质
US20230283560A1 (en) Converged avionics data network
CN115208837B (zh) 一种报文调度方法和系统
WO2024045832A1 (zh) 队列调度方法及装置
Yao et al. Burst-Aware Mixed Flow Scheduling in Time-Sensitive Networks for Power Business

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21949688

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2021949688

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 18557364

Country of ref document: US

ENP Entry into the national phase

Ref document number: 2021949688

Country of ref document: EP

Effective date: 20231023

WWE Wipo information: entry into national phase

Ref document number: 2023571943

Country of ref document: JP

ENP Entry into the national phase

Ref document number: 20237040041

Country of ref document: KR

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 1020237040041

Country of ref document: KR

NENP Non-entry into the national phase

Ref country code: DE